Computer Networks MCQ

1. Multifactor authentication is all of these except _____.

Answer

Correct Answer: What you calculate.

Note: This Question is unanswered, help us to find answer for this one

2. In all parity memory uses __________.

Answer

Correct Answer: 9 bits

Note: This Question is unanswered, help us to find answer for this one

3. In most current systems, ________ is the type of ram used.

Answer

Correct Answer: DDR3

Note: This Question is unanswered, help us to find answer for this one

4. In dolby digital 7.1, the 1 indicates a ________ speaker.

Answer

Correct Answer: Subwoofer

Note: This Question is unanswered, help us to find answer for this one

5. A(n) _____ is the equivalent to a subsystem.

Answer

Correct Answer: Partition

Note: This Question is unanswered, help us to find answer for this one

6. Each clock cycle the cpu spends waiting for a slower device is called a ____.

Answer

Correct Answer: Wait state

Note: This Question is unanswered, help us to find answer for this one

7. A 200-mhz motherboard has its chipset chips all timed by a _______________ crystal.

Answer

Correct Answer: 200-MHz

Note: This Question is unanswered, help us to find answer for this one

8. Digital camcorders are similar to conventional ____ camcorders.

Answer

Correct Answer: Analog

Note: This Question is unanswered, help us to find answer for this one

9. Gabrielle is planning to connect selected devices to the network wirelessly with a wireless ____.

Answer

Correct Answer: Access point

Note: This Question is unanswered, help us to find answer for this one

10. Fibre channel can support the interconnection of up to ____ devices only.

Answer

Correct Answer: 126

Note: This Question is unanswered, help us to find answer for this one

11. Icmp type ____ is used for echo request packets.

Answer

Correct Answer: 8

Note: This Question is unanswered, help us to find answer for this one

12. Talkwalker and twubs are examples of ____ search engines and tools.

Answer

Correct Answer: Hashtag

Note: This Question is unanswered, help us to find answer for this one

13. A ____ server hosts only one site.

Answer

Correct Answer: Dedicated

Note: This Question is unanswered, help us to find answer for this one

14. A wireless _________ is the device that all nodes connect to in order communicate wirelessly.

Answer

Correct Answer: Access point

Note: This Question is unanswered, help us to find answer for this one

15. Kerberos __________ provides tickets to clients who request services.

Answer

Correct Answer: TGS

Note: This Question is unanswered, help us to find answer for this one

16. The ____ topology consists of a simple cable, or bus, to which all devices attach.

Answer

Correct Answer: Bus/tree

Note: This Question is unanswered, help us to find answer for this one

17. In ____ transmission, data can move in both directions at the same time, such as with a telephone.

Answer

Correct Answer: Full-duplex

Note: This Question is unanswered, help us to find answer for this one

18. Ethernet networks ____.

Answer

Correct Answer: Are based on the star topology.

Note: This Question is unanswered, help us to find answer for this one

19. Dsl connections usually use ____ to secure connections

Answer

Correct Answer: PPPoE

Note: This Question is unanswered, help us to find answer for this one

20. Dsl and fttp are examples of wired ______ internet service technologies.

Answer

Correct Answer: Broadband

Note: This Question is unanswered, help us to find answer for this one

21. Direct internet connections are typically ____ connections.

Answer

Correct Answer: Broadband

Note: This Question is unanswered, help us to find answer for this one

22. All of the following operating systems support p2p networking except ________.

Answer

Correct Answer: Unix

Note: This Question is unanswered, help us to find answer for this one

23. A ____ connects all lan central nodes in a group of buildings.

Answer

Correct Answer: Zone network

Note: This Question is unanswered, help us to find answer for this one

24. ______ is the process of dividing a hard disk into tracks and sectors.

Answer

Correct Answer: Formatting

Note: This Question is unanswered, help us to find answer for this one

25. ____ software searches a node for open ports.

Answer

Correct Answer: Port scanner

Note: This Question is unanswered, help us to find answer for this one

26. Intranets are also called _____.

Answer

Correct Answer: Corporate portals.

Note: This Question is unanswered, help us to find answer for this one

27. Internet networks are _____.

Answer

Correct Answer: Packet-switched networks

Note: This Question is unanswered, help us to find answer for this one

28. Internet addresses that are temporarily assigned are called ________ addresses.

Answer

Correct Answer: Dynamic

Note: This Question is unanswered, help us to find answer for this one

29. In comparison with primary storage, hard drives are ________.

Answer

Correct Answer: Slower in processing digital information

Note: This Question is unanswered, help us to find answer for this one

30. If networked, ____ can be accessed by an authorized lan user.

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

31. Conventional dial-up connects to the internet at a maximum of ____.

Answer

Correct Answer: 56 Kbps

Note: This Question is unanswered, help us to find answer for this one

32. Broadband is measured in _____ .

Answer

Correct Answer: Bits per second.

Note: This Question is unanswered, help us to find answer for this one

33. Bluetooth can be used to create a _____, to communicate among computerized devices.

Answer

Correct Answer: Personal area network

Note: This Question is unanswered, help us to find answer for this one

34. A(n) ______ is a program that extends the capability of a browser.

Answer

Correct Answer: Plug-in

Note: This Question is unanswered, help us to find answer for this one

35. A tcp three-way handshake is used to establish a ___________ messaging method.

Answer

Correct Answer: Connection-oriented

Note: This Question is unanswered, help us to find answer for this one

36. A network's ____ is the arrangement of computers and mobile devices, printers, and other devices.

Answer

Correct Answer: Physical topology

Note: This Question is unanswered, help us to find answer for this one

37. A network that spans a large physical distance is called a ________.

Answer

Correct Answer: WAN

Note: This Question is unanswered, help us to find answer for this one

38. _____ can be defined as systems that support electronically executed business transactions.

Answer

Correct Answer: Ecommerce

Note: This Question is unanswered, help us to find answer for this one

39. What are Data Centers used for?

Answer

Correct Answer: Housing business-critical applications and information

Note: This Question is unanswered, help us to find answer for this one

40. What is Beamforming used for?

Answer

Correct Answer: To focus a wireless signal towards a specific receiving device

Note: This Question is unanswered, help us to find answer for this one

41. What is Open RAN (O-RAN)?

Answer

Correct Answer: A wireless-industry initiative for designing and building 5G radio access networks

Note: This Question is unanswered, help us to find answer for this one

42. What does Network slicing do?

Answer

Correct Answer: Makes efficient use of carriers' wireless capacity

Note: This Question is unanswered, help us to find answer for this one

43. How much faster is 5G technology than its predecessors?

Answer

Correct Answer: 10 times

Note: This Question is unanswered, help us to find answer for this one

search